Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2024, 04:48

General

  • Target

    daa4cd42c55d73b503b0ab02f88994e087aa0d5e39e3e03ff11c75553a8d347aN.exe

  • Size

    112KB

  • MD5

    e07bf4806835395084efcbb509eb3f00

  • SHA1

    1834358bca7c676566501189f1ea4142b65804e1

  • SHA256

    daa4cd42c55d73b503b0ab02f88994e087aa0d5e39e3e03ff11c75553a8d347a

  • SHA512

    84888f35adc9fd0cd3d3cc4ecdd5fab0e93f4a2262f8cfaa861589dd560bc8f06f68e3781806343dfa488940d586edff9aadc125fffecdb2c5ef466b853cc48c

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TTQoQPyPhehFTW7JJ7TTQoQPyPhehR:fny1oRUhehOoRUhehR

Malware Config

Signatures

  • Renames multiple (3486) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\daa4cd42c55d73b503b0ab02f88994e087aa0d5e39e3e03ff11c75553a8d347aN.exe
    "C:\Users\Admin\AppData\Local\Temp\daa4cd42c55d73b503b0ab02f88994e087aa0d5e39e3e03ff11c75553a8d347aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    113KB

    MD5

    34e82a94ccc7b4c90114ed23eb27c57e

    SHA1

    8a2e2f9ddb00b8a30292a9d8fb4b805d02a8cc0c

    SHA256

    959b31b5172609614df6dc5c93732069ea3880150f55270527ed6bedfecaaea4

    SHA512

    e35ee3c131705b8ade0891a4ec53ec06121fe50267f40e4f34e55dc5790c3f0da02db5abdefa424adf357c7d978197c74f848801c1c6bc5b4a697703d2512254

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    121KB

    MD5

    41ea31e8c5106ad8656e77a6b79ab5e0

    SHA1

    fad782d8ecd77362894af8c85d7c056b3b545ca7

    SHA256

    16a51cd48e2b96e4130821dca76628f0f01fc8584ed1adff39743921f5a70271

    SHA512

    b3b3fe50fc06e28a4f44d5674021cd044af4c86167014a6a672a7696487fd41fe102a340096147aa5e1b903a0d23f4730c1086b16d696b08b23eb867ea9f91c7

  • memory/2188-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2188-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB